Break #2An
arrangement of fresh fruit, granola bars and danish will be
provided

FLOOR 2 - TEXAS BALLROOM / PRECONVENTION AREA

0400

0500

Location

0500

0600

Location

One Social Profile to Rule Them All – Social Media Exploitation

Mr. Joseph Muniz

Architect/ Security Researcher

Floor 1 - 1LS1

Talk

Agent: Speaker11

Security Company

Floor 1 - 1LS1

Mr. Jacob Robles

Senior Security Researcher

FLOOR 3 - 3ES2

Talk

MS. Speaker 222

Title Co.

FLOOR 3 - 3ES2

Talk

Mr. Speaker 33

Title Co.

FLOOR 3 - 3ES5

Talk

Mr. Speaker 44

Title Co.

FLOOR 3 - 3ES5

Hand on Lab

ICS 201

2 Hr Hands on Training & Labs

Mr. Speaker

Title.

FLOOR 3 - 3ES4

7 Steps to Effectively Defend Industrial Control Systems

Mr. Jonathan Homer

U.S. Department of Homeland Security

FLOOR 3 - 3SAB

Talk

Mr. Speakerss

Company XYZ

FLOOR 3 - 3SAB

Hackers
Heaven

Soc Defender

Capture the
Flag

Network CTF

Hackers
Heaven

Soc Defender

Capture the
Flag

Network CTF

0400

0500

Location

One Social Profile to Rule Them All – Social Media Exploitation

Mr. Joseph Muniz

Architect/ Security Researcher

Floor 1 - 1LS1

Mr. Jacob Robles

Senior Security Researcher

FLOOR 3 - 3ES2

Talk

Mr. Speaker 33

Title Co.

FLOOR 3 - 3ES5

Mr. Griffin Weaver

USAA

FLOOR 3 - 3ES4

7 Steps to Effectively Defend Industrial Control Systems

Mr. Jonathan Homer

U.S. Department of Homeland Security

FLOOR 3 - 3SAB

Hackers
Heaven

Soc Defender

Capture the
Flag

Network CTF

0530

0630

Location

PANEL DISCUSSION 1

Mrs. Speaker 1

Title

Mrs. Speaker 2

Title

Mrs. Speaker 3

Title

Mrs. Speaker 4

Title

FLOOR 2 - TEXAS BALLROOM

VILLAGES
CLOSE

0700

0900

Location

MOVIE: 300 Popcorn
and Drinks provided

FLOOR 2 - TEXAS BALLROOM

Opening Remarks

Recorded:
True

Opening Remarks and
Intro to Texas Cyber Summit & USA

Joseph Mlodzianowski Founder,
Texas Cyber Summit

Joseph has a long history in event coordination; nearly 20 years of bringing infosec and Cyber Security education and events to attendees. The Texas Cyber Summit was created for the future. The San Antonio Cyber community is the second largest in the nation, and the Texas Cyber Summit hopes to help expand the number of Cyber Security professionals and those interested in pursing a career in the field. Education, Community, Involvement and training are the key.

Keynote

Recorded:
True

Speaker 1Title, Organization

Soc Defender

Recorded:
False

OpenSOC is a challenge meant to teach information security professionals

Eric Capuano Founder and CEO,
Recon Infosec

Eric Capuano began his career in Information Security as a Tactics Developer for the United States Air Force, specializing later in intrusion detection signature development. Since departing active duty, Eric has lead cybersecurity operations in both private and government entities. He is the founder and CEO of Recon Infosec, an MSSP based in Austin, Texas. Eric continues to serves part-time in the Texas Air National Guard as a Cyber Warfare Operator. He also mentors a Cyber Patriot team, is a member of the Packet Hacking Village at DEFCON and teaches advanced digital forensics and incident response for SANS.

OpenSOC is a challenge meant to teach information security professionals practical incident response skills in an environment that very closely resembles a real enterprise network. OpenSOC includes a scaled down version of almost everything you would find in an enterprise network to include workstations, servers, firewalls, email, web browsing, user activity, etc. Simulated users are actually browsing the Internet, receiving emails, downloading files, watching videos, and accessing LAN resources. This creates a high fidelity training environment for unleashing real-world attacks and testing a responder's ability to filter out the noise and identify malicious activity on the network. Best part of all, OpenSOC leverages 100% free and open source solutions for threat hunting and forensics.

Threat Hunting on ICS Networks

Recorded:
True

Hands on Threat Hunting and Analysis of attacks on Industrial Control Networks.

Mr. Dan Gunter Principal Threat Analyst,
Dragos, Inc.

Dan Gunter is a Principal Threat Analyst at the industrial cyber security company Dragos, Inc. where he discovers, analyzes and neutralizes threats inside of ICS/SCADA networks. In this capacity, he performs threat hunting, incident response, and malware analysis mission for the industrial community. Previous to his role at Dragos, Dan served in a variety of Information Security roles as a Cyber Warfare Officer in the United States Air Force with duties ranging from Incident Response at the Air Force Computer Emergency Response Team to developing innovative capabilities for multiple Department of Defense partners. Dan has over 12 years' experience and has obtained the CISSP, GIAC GSEC, EC Council CEH and CompTIA Security+ certifications. He also holds a Bachelor of Science in Computer Science from Baylor University and a Master of Science in Computer Science from the University of Louisville. Dan previously presented at Blackhat and Shmoocon.

OpenSOC is a challenge meant to teach information security professionals practical incident response skills in an environment that very closely resembles a real enterprise network. OpenSOC includes a scaled down version of almost everything you would find in an enterprise network to include workstations, servers, firewalls, email, web browsing, user activity, etc. Simulated users are actually browsing the Internet, receiving emails, downloading files, watching videos, and accessing LAN resources. This creates a high fidelity training environment for unleashing real-world attacks and testing a responder's ability to filter out the noise and identify malicious activity on the network. Best part of all, OpenSOC leverages 100% free and open source solutions for threat hunting and forensics.

In today's world of automation systems asset owners are struggling with connected technologies. There are still many with legacy control systems being assessed and even newly deployed systems have the same challenges as their predecessors. So what's the same or what's changed? The biggest realities being faced today is deployment, architecture, remote access and physical access practices. This presentation provides real world from the field "as-founds" and what we can do better as vendors, integrator, systems technicians and competent cyber warriors. This presentation also talks about the benefits of IIoT (Industrial Internet of Things) and its challenges of deployment, integration security and the term "Remote Control". Topics we must face as safety and security leads and Health Safety and Environment advocates in today’s world.

Marco (Marc) Ayala has over 23 years and has .been involved in process automation and safety and is active in the Oil & Gas and Chemical Sector cyber security effort in the private sector. Mr. Ayala has as an end user from I&E and I&C through his career to handling advanced process control, maintained and designed enterprise historians and has worked with enterprise-IT to perfect a direct balance of ICS/SCADA Industrial-IT and demarc with Enterprise-IT. Marco has secured numerous plant processes in the US and abroad.

Mr. Ayala worked for AkzoNobel for 14 years prior to joining Siemens Process Automation as their PCS7 AE Applications Engineer for the Gulf Coast. Mr. Ayala was a member of the US-Cyber Hub for Siemens.

Recent APT Campaign targeting Energy Sector Assets

Recorded:
True

Recent APT Campaign targeting Energy Sector Assets.

Mr. Jonathan Homer Chief, Industrial Control System Group,
U.S. Department of Homeland Security

Over the past year, a concentrated effort has been focused on specific energy sector critical assets, leveraging trusted relationships within supply chains and other partnerships in an attempt to gain access to corporate and control system networks. This technical discussion will review the threat actor’s tactics and techniques observed during multiple on-site incident response engagements conducted by the DHS NCCIC Hunt and Incident Response Team related to this campaign.

Seven Steps to Effectively Defend Industrial Control Systems

Recorded:
True

Seven strategies that can be implemented today to counter common exploitable weaknesses in “as-built” control systems..

Mr. Jonathan Homer Chief, Industrial Control System Group,
U.S. Department of Homeland Security

Cyber intrusions into US Critical Infrastructure systems are happening with increased frequency. For many industrial control systems (ICSs), it’s not a matter of if an intrusion will take place, but when. The capabilities of our adversaries have been demonstrated and cyber incidents are increasing in frequency and complexity. Simply building a network with a hardened perimeter is no longer adequate. Securing ICSs against the modern threat requires well-planned and well-implemented strategies that will provide network defense teams a chance to quickly and effectively detect, counter, and expel an adversary. This presentation presents seven strategies that can be implemented today to counter common exploitable weaknesses in “as-built” control systems.

Carrying the SecURITy Shield – U R IT!

Recorded:
True

Carrying the SecURITy Shield

Mr. Chris Knox Mgr. Security Awareness and Analysis,
CPS Energy

This session will examine an organization’s journey to create, deploy and enhance a security awareness program designed to change workforce behavior and reduce the risk of susceptibility to security-related incidents; specifically social engineering & phishing.

Real-life incident response: An Evolution of Attacks Against Infrastructure and Security Devices

Omar Santos is an active member of the cyber security community, where he leads several industry-wide initiatives and standards bodies. His active role helps businesses, academic institutions, state and local law enforcement agencies, and other participants dedicated to increasing the security of their critical infrastructures. Omar is the author of more than twenty (20) books and video courses, as well as numerous white papers, articles, and security configuration guidelines and best practices. Omar is a principal engineer of the Cisco Product Security Incident Response Team (PSIRT), where he mentors and leads engineers and incident managers during the investigation and resolution of cyber security vulnerabilities.

Wiping The Slate Clean: The Ongoing Evolution of Wiper Malware

Recorded:
False

Mr.Edmund Brumaghin Threat Researcher,
Talos Outreach

Wiper malware has been leveraged by attackers for years to facilitate the destruction of data and systems. In many cases, this malware has caused widespread
operational issues for organizations and critical infrastructure all over the globe. Attackers have increasingly been leveraging and improving upon their wiper malware over the past several years. This talk will cover several notable examples of wiper malware,
how they were distributed and the impacts that resulted from these attacks. It will also provide analysis of the technical capabilities present within wiper malware as well as the emergence of self-propagating wiper worms as a means for attackers to cause
significant impact to target organizations very quickly.

Social Engineering, dont fall for it.

Recorded:
True

Mr. Jayson E. Street Global Ambassador,
Defcon Groups

Jayson E. Street is the author of the book series "Dissecting the hack", and serves as a Global Ambassador for the Defcon Groups – The longest running hacking conference in the world. Additionally, Jayson serves as the Vice President of InfoSec for SphereNY. Highly sought as a global industry leader, he speaks at dozens of venues each year in the technical, business and academic arenas. Some examples from the past twelve months include: Defcon, DerbyCon, GRRCon, National Chamber of Commerce Events, National Banking Industry Events, National Private Security events as well as several other 'CONs and colleges on a variety of Information Security subjects in the United States and across the world. Jayson has been recognized for various achievements over the years including his nomination as of one of Time's persons of the year in 2006.

The Challenges of Enterprise Segmentation

Recorded:
True

Discussion will focus on the challenges faced in segmenting an enterprise environment, deciding on a strategy, selecting and designing a best solution, and what successful implementation requires.

Mario Balakgie joined World Wide Technology in 2013 after 28 years of professional experience in security in both the government and private sectors. During his tenure with the government Mario served as the Chief Information Security Officer for the Defense Intelligence Agency where he was responsible for information technology, data integrity and security, and global network communications. In this executive role Mario was instrumental in the establishment of key global information security capabilities for the Intelligence Community involving mitigation of advanced threats and implementation of security readiness and monitoring practices. He has served on special assignments to include the largest ever technology exploitation and forensic mission searching for evidence of weapons of mass destruction. Mario’s information security expertise has been called upon for Congressional testimony that ultimately established today’s federal standards for cyber protection.

As a Director in the Security Practice Mario delivers consulting services to clients by working with executives and addressing the demands of security on a global and enterprise scale. He leads a team of professionals with expertise to assist clients in defining comprehensive security and privacy programs mapped to business imperatives. This includes advanced technology solutions to support a range of clients and working with them to meet organizational requirements for establishing, implementing, monitoring, and maintaining a highly capable security program.

Mario has received special recognition to include Executive Performance of the Year, Civilian
Accommodation Award(s), Distinguished Performance, and Special Achievement from the Director of
FBI and Director of National Intelligence Community. He holds a B.S. in Computer Science/Information
Systems and is a Certified Information Security Manager (CISM).

A PROPER INTRODUCTION TO METASPLOIT

Mr. Aaron Soto Senior Security Researcher,
RAPID7

Aaron Soto, is at Rapid7, focusing on Metasploit core improvements, helping first-time contributors submit pull requests to the metasploit-framework repo, and training newcomers to the InfoSec community. In his spare time, he wrecks cars at Lemons, carries around a ham radio, and volunteers at Austin Pets Alive!

Mr. Jacob Robles Senior Security Researcher,
RAPID7

Jacob Robles, is on the Metasploit team at Rapid7 and works on porting proof-of-concept exploits to Metasploit modules and reviewing pull requests from community contributors. Previously, Jacob was a security consultant at Rapid7 and performed penetration testing for both internal and external clients.

If you are responsible for an organization’s security, it is very likely you are running some form of a security operation center (SOC). The maturity of your practice can range from one person responsible for everything to a team of people using various tools and process. Every network is different however the goal is typically the same … protect people and data from cyber threats.

This talk will look at industry best practices for running a successful SOC. Topics will include tools, practices and even touch on popular certifications for those looking to get into this type of work. The goal is to walk away with an understand of what security technology is available and how it can improve your capabilities. I will also look when it could make sense to outsource part or all of your SOC capabilities as well as cover a broad understanding of meeting compliance requirements.

The speaker is the author of a handful of hacking and security titles including Cisco Press titles on developing security operation centers as well as security operations certifications like the CSA+ and Cisco CCNA Cyber ops.

Mr. Joseph Muniz Architect/ Security Researcher,
Cisco Systems.

Joseph Muniz is an architect at Cisco Systems and security researcher. He has extensive experience in designing security solutions and architectures for the top Fortune 500 corporations and US Government. Examples of Joseph’s research is his RSA talk titled Social Media Deception quoted by many sources found by searching “Emily Williams Social Engineering” as well as articles in PenTest Magazine regarding various security topics.

Joseph runs thesecurityblogger website, a popular resource for security and product implementation. He is the author and contributor of several publications including titles on building security operations centers (SOC)s, CCNA cyber ops certification, web penetration testing and hacking with raspberry pi. Joseph’s next title, Digital Forensics for Network Engineers released on Cisco Press was released late February 2018. Follow Joseph at www.thesecurityblogger.com and @SecureBlogger.

One Social Profile to Rule Them All – Social Media Exploitation

Recorded:
True

If you have been on the internet the last 10 years, then you likely are using some form of social media. You probably have heard of phishing however, could social media be used for phishing and what potential danger could occur from social media sources? Find the answer to those and other phishing related questions based on a real penetration test that leveraged phishing as a means to deliver advanced exploitation. The speaker is the author of various penetration testing, forensics and SOC best practices titles giving his real world experience with social media exploitation.

Mr. Joseph Muniz Architect/ Security Researcher,
Cisco Systems.

Joseph Muniz is an architect at Cisco Systems and security researcher. He has extensive experience in designing security solutions and architectures for the top Fortune 500 corporations and US Government. Examples of Joseph’s research is his RSA talk titled Social Media Deception quoted by many sources found by searching “Emily Williams Social Engineering” as well as articles in PenTest Magazine regarding various security topics.

Joseph runs thesecurityblogger website, a popular resource for security and product implementation. He is the author and contributor of several publications including titles on building security operations centers (SOC)s, CCNA cyber ops certification, web penetration testing and hacking with raspberry pi. Joseph’s next title, Digital Forensics for Network Engineers released on Cisco Press was released late February 2018. Follow Joseph at www.thesecurityblogger.com and @SecureBlogger.

Keynote I

Prior to starting TrustedSec, David was the Chief Security Officer (CSO) for Diebold Incorporated, a Fortune 1000 company, with locations in over 80 countries. He developed a global security program that tackled all aspects of information security and risk management. Kennedy started his professional career as a member of the United States Marine Corps (USMC), and was deployed to Iraq twice for intelligence related missions.

Founding developer of the Penetration Testing Execution Standard (PTES), the industry leading standard on how penetration assessments are to be executed. The Payment Card Industry (PCI) Data Security Standard (DSS) adopted the PTES as their standard.

Co-Founder of DerbyCon

ISC2 Board of Directors

David has had numerous guest appearances on Fox News, CNN, CNBC, MSNBC, the Huffington Post, Bloomberg, BBC, The Katie Couric Show, and other high-profile media outlets. In addition, his tools have been featured on a number of TV shows and movies. David has assisted in some of the content for the widely popular Mr. Robot TV show, and advises on other news organizations and TV shows, including the History Channel.

Co-Host of the TrustedSec Podcast and the Social Engineer Podcast.

Keynote II

Mr. Moss advises companies on security issues, both, electronic and physical, as well as speaking globally on the topic. He sits on several advisory boards helping enterprises make informed decisions on cyber risks. In April 2011 Mr. Moss was appointed as the Chief Security Officer for the Internet Corporation for Assigned Names and Numbers (ICANN), a non-profit whose responsibilities include coordinating and ensuring the security, stability and resiliency of the Internet's unique global identifiers as well as maintaining the root zone of the Internet. This position involved managing the IT security of the ICANN networks and information systems, the physical security of ICANN facilities and meetings, and ensuring that ICANN meets its security and resiliency commitments to the multi stake holder community that oversees ICANN. This position involved extensive international travel and coordination with governments, law enforcement, and operational security communities in support of discussions around Internet Governance and security. Mr. Moss left this position at the end of 2013. Moss is the founder and creator of both the Black Hat Briefings and DEF CON, two of the most influential information security conferences in the world, attracting over ten thousand people from around the world to learn the latest in security technology from those researchers who create it. DEF CON just had its 21st anniversary. Prior to creating Black Hat Briefings, Jeff was a director at Secure Computing Corporation where he helped establish their Professional Services Department in the United States, Asia, and Australia. His primary work was security assessments of large multi-national corporations. Jeff has also worked for Ernst & Young, LLP in their Information System Security division. Because of this unique background Jeff is uniquely qualified with his ability to bridge the gap between the underground researcher community and law enforcement, between the worlds of pure research and the responsible application of disclosure. Jeff is currently a member of the U.S. Department of Homeland Security Advisory Council (HSAC), providing advice and recommendations to the Secretary of the Department of Homeland Security on matters related to homeland security. Jeff is a life member of the Council on Foreign Relations, which is an independent, nonpartisan membership organization, think tank, and publisher. In 2013, Jeff was appointed as a Nonresident Senior Fellow at the Atlantic Council, associated with the Cyber Statecraft Initiative, within the Brent Scowcroft Center on International Security. In 2014, Jeff joined the Georgetown University School of Law School Cybersecurity Advisory Committee. Jeff is active in the World Economic Forum, and recently became a member of the Cyber Security Global Agenda Council for 2014-2016. ICSA President's Award for Public Service, 2011.

Legal and Regulatory Cyber Compliance

Presenting legal and compliance topics relevant for today’s cybersecurity professionals. This presentation will include discussions of current laws including NYDFS 500, NAIC Model Laws, GLBA and various topics from the FFIEC among others. Additional topics will include meeting regulatory requirements for risk assessments and a presentation of the various cybersecurity testing models for financial institutions such as the FFIEC CAT. Recent successful cyber-attacks have led the various federal and state legislative bodies to start increasing their regulation over the cybersecurity industry by including new requirements in new laws and regulations that cyber professionals should be aware of. The presenters will also discuss the best use of cyber security legal compliance in raising cyber awareness of executives who may not normally face heightened cyber compliance requirements. Finally, the presentation will be followed by a Q&A Session with the speakers who are experienced in regulatory cyber law and compliance.

Jason Edwards, has over 20 years of IT/Cybersecurity experience in various sectors such as military/government, insurance, digital security, banking, and energy. Jason currently works for USAA as the Compliance Director for Cybersecurity. He serves as the primary compliance advisor for the CISO and Information Security teams at USAA on regulatory compliance matters.

Jason has earned the CISSP as well as both a B.S. and M.S. in Information Technology/Security. Jason is currently in his final year of a doctoral program working to complete a dissertation on the 'Regulatory Cybersecurity Testing of Financial Institutions'. After earning his doctorate, Jason intends to pursue a second doctorate and possibly teach at the doctoral level.

Griffin Weaver, is an attorney at the United Services Automobile Association (USAA), where is a member of the Enterprise Operations Counsel Group. Griffin serves as the primary legal counsel on issues related to cybersecurity, data security, insider threats, and financial cyber regulation. He also regularly advices business leaders on complex outsourcing transactions related to technology such as cloud computing arrangements, Software as a Service, Platform as a Service, Business Process Outsourcing, confidentiality, and data security. Griffin has worked extensively in matters involving US cybersecurity regulations such as NYDFS, NAIC model law, and the GLBA.

Prior to working as an attorney, Griffin spent over 6 years working in Information Technology as a project manager and backend developer. He earned his J.D. from the University of Utah and his B.A. in Middle Eastern Studies/Arabic from Brigham Young University. He is admitted to the bars of the State of Texas and the State of Utah.

I'm Pwned. You're Pwned. We're All Pwned.

Recorded:
True

Face it - it's going to happen. It's going to happen to you, it's going to happen to your company and it's definitely happened to me! Security incidents are now just a part of normal everyday online life and we need to adapt to the new reality.

In this talk, we'll look at how security is changing and the things we can do to evolve our approaches in the era of the data breach. You'll see many of the common attacks organisations are falling victim to today, how our attitudes towards passwords are changing, how to get responsible disclosure right (both as an individual and an organisation) and get a look inside some of the more modern security defences out browsers offer us today. This talk is a mix of real world events, practical coding and face-palmingly painful security examples.

Mr. Troy is a Microsoft Regional Director and MVP, Pluralsight author and world-renowned internet security specialist. He spends his time teaching developers how to break into their own systems before helping to piece them back together to be secure against today’s online threats. He’s also the creator of Have I Been Pwned, the free online service for breach monitoring and notifications. Troy regularly blogs at troyhunt.com from his home in Australia.

Cyber Threat Response (CTR) Clinic

Recorded:
True

Cyber Threat Response (CTR) Clinic to perform attack and defend scenarios - Choose your adventure. CTR was created to teach you WHY certain defense capabilities are critical for preventing a future compromise of your network. Help Mr. Black be attacker using Kali Linux and other tools to exploit systems, infect endpoints with Ransomware and exfiltrate data to be sold on the Darknet. Defend the fictitious hospital using Firewall, IPS, Breach Detection, NetFlow Analytics, SIEM, Access Control and Vulnerability Management. Join the cyber cat and mouse game however, you must bring your own laptop to play! Note: No harm will be done to your system as the entire environment is in an isolated container.

Mr. Joseph Mlodzianowski Founder,
Texas Cyber Summit

Mr.Joseph has a long history in event coordination; nearly 20 years of bringing infosec and Cyber Security education and events to attendees. The Texas Cyber Summit was created for the future. The San Antonio Cyber community is the second largest in the nation, and the Texas Cyber Summit hopes to help expand the number of Cyber Security professionals and those interested in pursing a career in the field. Education, Community, Involvement and training are the key.

Day 2

Track 1 1LS1 CYBER 101

Track 2 3ES2 RED TEAM TOOLS & TACTICS

Track 3 3ES5 BLUE TEAM DEFENDERS

Track 4 3ES4 BREAKING CYBER

Track 5 3SAB SCADA - CRITICAL INFRASTRUCTURE

Villages & Events

0800

0900

Location

Registration / Coffee An arrangement of fresh fruit, granola bars and danish will be
provided

FLOOR 2 - TEXAS BALLROOM/PRECONVENTION AREA

0900

1000

Location

Keynote

Mr. Speaker

Well known Person

Speaker 1

Well known Person

FLOOR 2 - TEXAS BALLROOM

1000

1100

Location

1100

1200

Location

Talk

Agent1

Security Title

FLOOR 1 - 1LS1

Talk 001

Agent

Security Company

FLOOR 1 - 1LS1

Talk

MS. Speaker

Title

FLOOR 3 - 3ES2

Talk

MS. Speaker

Title 1.

FLOOR 3 - 3ES2

Level Up Your SOC

Mr. Joseph Muniz

Architect/ Security Researcher

FLOOR 3 - 3ES5

Real-life Incident Response

Mr. Omar Santos

Principal Engineer

FLOOR 3 - 3ES5

Talk 0

Mr. Speaker

Company XYZ

FLOOR 3 - 3ES4

Talk

Mr. Speaker

Company XYZ

FLOOR 3 - 3ES4

Advanced Threat Hunting on an ICS Network

ICS 202

2 Hr Hands on
Training & Labs

Mr. Dan Gunter

Principal Threat Analyst

FLOOR 3 - 3SAB

Hackers
Heaven

Soc Defender

Capture the
Flag

Network CTF

Hackers
Heaven

Soc Defender

Capture the
Flag

Network CTF

1200

0100

Location

LUNCH

FLOOR 2 - TEXAS BALLROOM

0100

0200

Location

Talk t1

Speaker

Title

FLOOR 1 - 1LS1

METASPLOIT MODULE AND EXPLOIT DEVELOPMENT

Talk t3

MS. Speaker

Title

FLOOR 3 - 3ES5

Talk t4

MS. Speaker

Title

FLOOR 3 - 3ES4

Talk t5

Mr. Speaker

Title

FLOOR 3 - 3SAB

Hackers
Heaven

Soc Defender

Capture the
Flag

Network CTF

0200

0300

Location

Talk t1

Speaker

Title

FLOOR 1 - 1LS1

3 Hr Hands on Training & Labs

Mr. Aaron Soto

Senior Security Researcher

Talk t3

MS. Speaker

Title

FLOOR 3 - 3ES5

Talk t4

MS. Speaker

Title

FLOOR 3 - 3ES4

Talk t5

Mr. Speaker

Title

FLOOR 3 - 3SAB

Hackers
Heaven

Soc Defender

Capture the
Flag

Network CTF

0300

0330

Location

Break #2An
arrangement of fresh fruit, granola bars and danish will be
provided

FLOOR 2 - TEXAS BALLROOM / PRECONVENTION AREA

0330

0430

Location

0430

0530

Location

Talk

Agent: 11

Security Title

FLOOR 1 - 1LS1

Talk

Agent: Speaker11

Security Company

FLOOR 1 - 1LS1

Mr. Jacob Robles

Senior Security Researcher

FLOOR 3 - 3ES2

Talk

MS. Speaker 222

Title Co.

FLOOR 3 - 3ES2

Talk

Mr. Speaker 33

Title Co.

FLOOR 3 - 3ES5

Talk

Mr. Speaker 44

Title Co.

FLOOR 3 - 3ES5

Hand on Lab

ICS 201

2 Hr Hands on Training & Labs

Mr. Speaker

Title.

FLOOR 3 - 3ES4

Talk 999

Mr. Speaker

U.S. Department of Homeland Security

FLOOR 3 - 3SAB

Talk

Mr. Speaker

Company XYZ

FLOOR 3 - 3SAB

Hackers
Heaven

Soc Defender

Capture the
Flag

Network CTF

Hackers
Heaven

Soc Defender

Capture the
Flag

Network CTF

0600

0800

Location

Social & Recruiting Mixer

Mrs. Speaker 1

Title

Mrs. Speaker 2

Title

Mrs. Speaker 3

Title

Mrs. Speaker 4

Title

FLOOR 2 - TEXAS BALLROOM

VILLAGES
CLOSE

0830

0930

Location

MOVIE: 300 Popcorn
and Drinks provided

FLOOR 2 - TEXAS BALLROOM

Day 3

Track 1 1LS1 CYBER 101

Track 2 3ES2 RED TEAM TOOLS & TACTICS

Track 3 3ES5 BLUE TEAM DEFENDERS

Track 4 3ES4 BREAKING CYBER

Track 5 3SAB SCADA - CRITICAL INFRASTRUCTURE

Villages & Events

0800

0900

Location

Registration / Coffee An arrangement of fresh fruit, granola bars and danish will be
provided